
Chapter Summary: Cyber Security
1. Introduction to Cyber Security
Cyber security is a critical aspect of protecting information, data, and systems from digital threats, attacks, and unauthorized access. As we depend more on the internet and digital platforms for daily activities, ensuring the safety and privacy of this information has become more important than ever. Cyber security encompasses a variety of tools, policies, and practices aimed at protecting systems, networks, and data from attacks, damage, or unauthorized access.
2. Types of Cyber Threats
Cyber threats can vary widely, but they often involve malicious attempts to access, steal, alter, or destroy data. Common types of cyber threats include:
- Hacking: Hacking involves unauthorized access to computer systems or networks, often for malicious purposes such as stealing data or launching attacks.
- Viruses: Viruses are programs designed to replicate themselves and spread from one system to another, often damaging files and causing disruptions in system functions.
- Worms: Similar to viruses, worms are self-replicating programs but can spread without needing to attach themselves to other programs.
- Trojans: Trojan horses are malicious programs disguised as legitimate software. Once installed, they can grant unauthorized access to attackers.
- Ransomware: This type of malware locks users out of their systems or encrypts files, demanding payment in exchange for restoring access.
- Spyware: Programs designed to secretly monitor the user’s activities, often for gathering sensitive information, such as passwords or financial data.
- Phishing: Phishing attacks use deceptive emails or websites to trick users into revealing sensitive information, such as usernames, passwords, or credit card details.
- Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks: These attacks aim to overwhelm a server, network, or website, causing it to become unavailable to users.
3. Cyber Security Measures and Solutions
To safeguard against these threats, a combination of preventive, detective, and corrective measures is used:
- Firewalls: Firewalls act as barriers between a trusted internal network and an untrusted external network (like the internet). They can filter incoming and outgoing traffic based on predefined security rules, blocking potential threats.
- Antivirus Software: Antivirus programs are designed to detect and remove viruses, malware, and other harmful software from a computer or network. These programs typically include real-time scanning, heuristic analysis, and signature-based detection methods.
- Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS): IDS monitor network traffic for signs of potential attacks or suspicious activities. IPS not only detects threats but also takes action to block them in real time.
- Encryption: Encryption ensures that even if data is intercepted, it cannot be read without the correct decryption key. It is a fundamental component of securing sensitive information, such as passwords and financial transactions.
- Multi-Factor Authentication (MFA): MFA adds an additional layer of security by requiring multiple forms of identification, such as something the user knows (password) and something the user has (smartphone or token).
- Backup Systems: Regular backups are crucial for protecting against data loss, whether caused by a cyberattack (such as ransomware) or hardware failure.
4. Digital Signatures and Public Key Infrastructure (PKI)
Digital signatures use cryptography to verify the authenticity and integrity of digital messages or documents. They are often used in email communications, software distribution, and online transactions.
- Public Key Infrastructure (PKI): PKI is a system that manages the creation, distribution, and revocation of digital certificates used for digital signatures and encryption. It includes a key pair system: one public key for encryption and one private key for decryption.
5. The Role of Encryption in Cyber Security
Encryption is one of the most important tools for securing communications and data in transit. It prevents unauthorized access to sensitive information by converting plaintext into ciphertext, which is unreadable without the decryption key.
- Symmetric Encryption: This type of encryption uses the same key for both encryption and decryption.
- Asymmetric Encryption: This involves a pair of keys: a public key for encryption and a private key for decryption. It’s often used in online transactions, such as SSL/TLS for secure web browsing.
6. Phishing and Social Engineering
Phishing is a form of cyber attack that relies on social engineering to manipulate individuals into disclosing sensitive information. It often takes the form of fake emails, websites, or messages that appear legitimate but are designed to deceive the target.
- Spear Phishing: This is a more targeted form of phishing, where the attacker customizes the attack to a specific individual or organization.
- Vishing and Smishing: These are variations of phishing that use voice (vishing) or text messages (smishing) to trick the victim into sharing personal information.
7. Ethical Hacking and Penetration Testing
Ethical hacking, also known as penetration testing or white-hat hacking, involves authorized attempts to breach systems to find vulnerabilities before malicious hackers can exploit them. Ethical hackers use the same techniques as black-hat hackers but work with the permission of the organization they are testing.
8. Cyber Security Laws and Regulations
With the increasing reliance on technology, governments have enacted laws and regulations to help combat cyber crime and ensure the protection of digital information:
- General Data Protection Regulation (GDPR): A regulation in the European Union that mandates strict rules for how personal data is collected, stored, and used.
- Cybersecurity Information Sharing Act (CISA): In the United States, CISA encourages companies to share cyber threat information with the government to improve overall security.
- Health Insurance Portability and Accountability Act (HIPAA): A US law that requires the protection of medical information.
9. Threat Intelligence and Incident Response
Effective cyber security involves constantly monitoring, analyzing, and responding to threats. Threat intelligence involves gathering information about potential and existing threats to improve an organization’s defense posture.
- Incident Response: This is the process of identifying, investigating, and mitigating a cyber incident, such as a breach or attack. A well-established incident response plan is critical to reducing the impact of a security breach.
10. Future Trends in Cyber Security
As technology continues to evolve, so do the threats. Some future trends include:
- AI and Machine Learning in Cyber Security: These technologies are being used to improve threat detection and automate responses to attacks.
- Quantum Computing: Although still in its early stages, quantum computing has the potential to break traditional encryption methods, prompting the development of quantum-safe cryptography.
- Zero Trust Security Models: This approach assumes that threats exist both inside and outside the network, requiring continuous verification of users, devices, and systems.
Cyber Security MCQs:
- What is the primary purpose of a firewall? a) To encrypt data
b) To monitor internet traffic
c) To prevent unauthorized access
d) To detect malware
Answer: c) To prevent unauthorized access - Which of the following is a common method used in phishing attacks? a) Malicious websites
b) Keyloggers
c) Fake emails
d) Ransomware
Answer: c) Fake emails - What is the main function of antivirus software? a) To protect against unauthorized access
b) To scan and remove viruses
c) To encrypt data
d) To monitor internet traffic
Answer: b) To scan and remove viruses - Which of these is a type of malware that demands a ransom to restore access? a) Trojan horse
b) Worm
c) Ransomware
d) Spyware
Answer: c) Ransomware - What does “phishing” refer to in cyber security? a) Accessing a computer without permission
b) Deceptive attempts to obtain sensitive information
c) Disrupting a network’s services
d) Monitoring user activities
Answer: b) Deceptive attempts to obtain sensitive information - Which of the following is a security measure to prevent unauthorized access to sensitive data? a) Firewall
b) Antivirus software
c) Encryption
d) Both a and c
Answer: d) Both a and c - Which of these is NOT a type of cyber attack? a) Phishing
b) Hacking
c) Encryption
d) Ransomware
Answer: c) Encryption - What is a “Trojan Horse” in terms of cyber threats? a) A self-replicating virus
b) A type of firewall
c) A malicious software disguised as a legitimate program
d) A method of encryption
Answer: c) A malicious software disguised as a legitimate program - Which type of attack is aimed at overloading a server with requests, making it unavailable to users? a) Phishing
b) DoS (Denial of Service)
c) Worms
d) Spyware
Answer: b) DoS (Denial of Service) - Which technology is used to securely encrypt data for online transactions? a) HTTPS
b) HTTP
c) FTP
d) SMTP
Answer: a) HTTPS - What does “VPN” stand for in cyber security? a) Variable Protection Network
b) Virtual Private Network
c) Visual Public Network
d) Variable Public Network
Answer: b) Virtual Private Network - Which of these is an example of social engineering? a) Keyloggers
b) Phishing
c) Malware
d) Ransomware
Answer: b) Phishing - What is the purpose of multi-factor authentication (MFA)? a) To encrypt communication
b) To verify the identity of users through multiple factors
c) To block all unauthorized traffic
d) To monitor suspicious activities
Answer: b) To verify the identity of users through multiple factors - Which of the following is an example of spyware? a) A virus that replicates itself
b) Software that monitors user activity without consent
c) Software that protects against malware
d) Software that encrypts files
Answer: b) Software that monitors user activity without consent - What does “DDoS” stand for in cyber security? a) Distributed Denial of Service
b) Direct Denial of Service
c) Direct Digital Online Security
d) Distributed Digital Operating System
Answer: a) Distributed Denial of Service - Which of the following is used to protect data in a secure environment by converting it into unreadable format? a) Decryption
b) Encryption
c) Authentication
d) Authorization
Answer: b) Encryption - Which is an example of a password manager? a) A tool that encrypts passwords
b) A service that checks password strength
c) A software that stores and manages passwords securely
d) A service for authenticating users
Answer: c) A software that stores and manages passwords securely - What is “rootkit” in terms of computer security? a) Software that mimics legitimate programs
b) A tool for recovering lost data
c) A type of antivirus program
d) A type of software that hides malware and provides unauthorized access
Answer: d) A type of software that hides malware and provides unauthorized access - What does “SSL” stand for in internet security? a) Secure Secure Link
b) Secure Sockets Layer
c) System Security Layer
d) Secure Software Login
Answer: b) Secure Sockets Layer - Which of the following is a key element of a “Zero Trust” security model? a) Assume that the internal network is always secure
b) Only verify external connections
c) Assume all network traffic is potentially malicious
d) Use firewalls exclusively for protection
Answer: c) Assume all network traffic is potentially malicious
- What is the main goal of encryption? a) To hide malware
b) To verify the identity of users
c) To ensure data confidentiality
d) To compress data
Answer: c) To ensure data confidentiality - Which of these is considered a best practice for creating strong passwords? a) Use a combination of letters, numbers, and symbols
b) Use your name and birthdate
c) Use a simple word
d) Use the same password for all accounts
Answer: a) Use a combination of letters, numbers, and symbols - What is a “backdoor” in terms of cyber security? a) A form of malware
b) A method of bypassing normal authentication
c) A type of firewall
d) A method of encryption
Answer: b) A method of bypassing normal authentication - Which of the following is a type of social engineering attack that uses phone calls to deceive the target? a) Vishing
b) Phishing
c) Smishing
d) Spear phishing
Answer: a) Vishing - Which term refers to the act of deceiving users into revealing personal information by pretending to be a trustworthy entity? a) Spoofing
b) Phishing
c) Hacking
d) Denial of Service
Answer: b) Phishing - Which of the following is NOT a feature of a secure website? a) HTTPS
b) SSL certificate
c) Padlock symbol in the browser
d) HTTP
Answer: d) HTTP - What is a “honeypot” in cyber security? a) A real system used to gather data
b) A decoy system designed to lure attackers and gather information
c) A backup system for securing data
d) A type of virus scanner
Answer: b) A decoy system designed to lure attackers and gather information - Which of the following is a type of malware that records keystrokes to gather sensitive information? a) Rootkit
b) Trojan
c) Keylogger
d) Worm
Answer: c) Keylogger - What does the “CIA” triad in cyber security stand for? a) Confidentiality, Integrity, Availability
b) Cryptography, Integrity, Authentication
c) Confidentiality, Integrity, Access
d) Communication, Integrity, Authentication
Answer: a) Confidentiality, Integrity, Availability - Which of the following methods can be used to authenticate users? a) Password
b) Biometric data
c) Smart cards
d) All of the above
Answer: d) All of the above - What does “two-factor authentication” (2FA) require? a) A password and an email verification
b) Two passwords
c) A password and an additional factor (such as a phone code or fingerprint)
d) A password and an encryption key
Answer: c) A password and an additional factor (such as a phone code or fingerprint) - Which of the following is a security protocol used to secure email communication? a) SSL
b) POP3
c) IMAP
d) S/MIME
Answer: d) S/MIME - What is “spam” in terms of email? a) Legitimate marketing emails
b) Unsolicited, usually irrelevant, and often malicious emails
c) Password protection for email accounts
d) A tool for encrypting email contents
Answer: b) Unsolicited, usually irrelevant, and often malicious emails - Which type of attack involves sending fraudulent communications that appear to come from a trustworthy source? a) Phishing
b) SQL Injection
c) Brute Force Attack
d) Cross-Site Scripting (XSS)
Answer: a) Phishing - Which of the following is an example of physical security in cyber security? a) Encryption
b) Firewall protection
c) Locking doors and controlling access to data centers
d) Antivirus software
Answer: c) Locking doors and controlling access to data centers - Which of the following protocols is used for securely accessing web-based applications? a) FTP
b) SMTP
c) HTTPS
d) HTTP
Answer: c) HTTPS - What is a “worm” in cyber security? a) A type of virus that self-replicates and spreads through networks
b) A program designed to steal personal information
c) A type of encryption technique
d) A method of password cracking
Answer: a) A type of virus that self-replicates and spreads through networks - What is a major function of a network Intrusion Detection System (IDS)? a) To stop malware from entering the network
b) To identify and respond to suspicious network activities
c) To encrypt sensitive data
d) To store backup copies of data
Answer: b) To identify and respond to suspicious network activities - What does the term “spoofing” refer to in cyber security? a) Unauthorized access to data
b) The act of disguising a communication to appear as though it is from a trusted source
c) Encrypting a message
d) Monitoring network traffic
Answer: b) The act of disguising a communication to appear as though it is from a trusted source - Which of the following is a popular cryptographic algorithm used in data encryption? a) SHA
b) RSA
c) AES
d) All of the above
Answer: d) All of the above - Which of these represents the process of transforming data into an unreadable format, requiring a key to decrypt? a) Compression
b) Authentication
c) Encryption
d) Authorization
Answer: c) Encryption - What is “social engineering” in the context of cyber security? a) Attacking a system through code vulnerabilities
b) Deceiving people into revealing confidential information
c) Using physical force to break into a building
d) Using encryption to secure data
Answer: b) Deceiving people into revealing confidential information - Which of the following is an example of a denial-of-service (DoS) attack? a) A virus that encrypts files
b) A worm that spreads across a network
c) Flooding a server with too many requests, making it unavailable
d) A keylogger that records keystrokes
Answer: c) Flooding a server with too many requests, making it unavailable - Which type of attack targets a database by inserting malicious code into the query string? a) Phishing
b) SQL Injection
c) Cross-Site Scripting (XSS)
d) DoS Attack
Answer: b) SQL Injection - What is the purpose of a Digital Signature? a) To encrypt data
b) To verify the authenticity and integrity of a message or document
c) To store encrypted data
d) To monitor network activity
Answer: b) To verify the authenticity and integrity of a message or document - What is the key difference between a virus and a worm? a) A worm requires a host file, while a virus does not
b) A virus self-replicates, while a worm does not
c) A worm can spread across networks independently, while a virus requires user interaction
d) A virus is harder to detect than a worm
Answer: c) A worm can spread across networks independently, while a virus requires user interaction - What is “Cross-Site Scripting” (XSS) in cyber security? a) A method of blocking unwanted network traffic
b) An attack that injects malicious scripts into webpages viewed by others
c) A technique used to prevent network intrusions
d) A form of encryption for web pages
Answer: b) An attack that injects malicious scripts into webpages viewed by others - Which of these is the primary function of a proxy server? a) To authenticate users
b) To act as an intermediary between a client and server
c) To store data backups
d) To encrypt communications
Answer: b) To act as an intermediary between a client and server - What is a “brute force” attack in cyber security? a) A method of attacking through social engineering
b) An attack that tries all possible combinations to crack a password
c) A method of stealing private keys
d) A method of spying on users’ activities
Answer: b) An attack that tries all possible combinations to crack a password - Which of the following is a commonly used tool for monitoring network traffic for potential intrusions? a) Firewall
b) IDS (Intrusion Detection System)
c) VPN
d) Encryption software
Answer: b) IDS (Intrusion Detection System)
- Which of the following is a form of malware designed to take control of a system without the user’s knowledge? a) Trojan
b) Worm
c) Rootkit
d) Virus
Answer: c) Rootkit - What is the primary function of a security patch in software? a) To add new features
b) To fix known vulnerabilities
c) To improve the software’s user interface
d) To improve system performance
Answer: b) To fix known vulnerabilities - Which type of attack targets the application layer of the OSI model by exploiting vulnerabilities in the web application? a) Buffer overflow
b) SQL injection
c) Phishing
d) Man-in-the-middle
Answer: b) SQL injection - What does the term “social engineering” refer to in the context of cyber security? a) Attacking a system via physical security breaches
b) Manipulating people to divulge confidential information
c) Encrypting sensitive data
d) Implementing security measures on a network
Answer: b) Manipulating people to divulge confidential information - Which of the following is a type of malicious software that pretends to be a legitimate program? a) Worm
b) Rootkit
c) Trojan horse
d) Virus
Answer: c) Trojan horse - What does the term “cryptojacking” refer to? a) Stealing encryption keys
b) Using a victim’s device to mine cryptocurrency without their consent
c) Encrypting files to extort money
d) Cracking encryption algorithms
Answer: b) Using a victim’s device to mine cryptocurrency without their consent - What is “zero-day” vulnerability? a) A vulnerability that is known but not yet patched
b) A vulnerability that is only discovered after the attack
c) A vulnerability discovered on the first day of the system’s release
d) A vulnerability that has no immediate threat
Answer: a) A vulnerability that is known but not yet patched - Which of the following is an example of a software that helps protect against cyber attacks by detecting malicious software? a) Firewall
b) Anti-malware
c) Virtual Private Network (VPN)
d) Backup software
Answer: b) Anti-malware - Which protocol is primarily used for sending email securely? a) SMTP
b) POP3
c) IMAP
d) S/MIME
Answer: d) S/MIME - Which of the following is used for preventing unauthorized access to a system’s resources? a) Encryption
b) Authentication
c) Anti-virus software
d) Data backup
Answer: b) Authentication - What is the main difference between a virus and a worm? a) Worms can replicate and spread without user intervention, whereas viruses need a host file
b) Viruses replicate, worms do not
c) Worms are harmless, viruses are dangerous
d) Viruses spread through the internet, worms do not
Answer: a) Worms can replicate and spread without user intervention, whereas viruses need a host file - Which of the following is a tool used to monitor network traffic and identify suspicious activity? a) Firewall
b) Intrusion Detection System (IDS)
c) Proxy server
d) Backup software
Answer: b) Intrusion Detection System (IDS) - What is a common symptom of a ransomware attack? a) Files become encrypted and demand payment for decryption
b) A system is slowed down significantly
c) The system becomes unresponsive to commands
d) Files are deleted without warning
Answer: a) Files become encrypted and demand payment for decryption - What is a “man-in-the-middle” attack? a) An attacker intercepts and alters communication between two parties
b) An attacker gains physical access to a device
c) An attacker infects a device with malware
d) An attacker floods a network with traffic to overload it
Answer: a) An attacker intercepts and alters communication between two parties - Which of the following is a method used to detect if a device has been compromised by malware? a) Regular patching
b) Antivirus software scanning
c) Multi-factor authentication
d) Data encryption
Answer: b) Antivirus software scanning - Which of these is considered a secure communication protocol for online shopping or banking? a) FTP
b) HTTPS
c) HTTP
d) SMTP
Answer: b) HTTPS - Which of the following would most likely help prevent a Cross-Site Scripting (XSS) attack? a) Use of input validation and output encoding
b) Using HTTPS only
c) Encrypting passwords
d) Implementing access control measures
Answer: a) Use of input validation and output encoding - What does “RSA” stand for in cryptography? a) Random Secure Algorithm
b) Ronald’s Secure Access
c) Rivest-Shamir-Adleman
d) Robust Secure Algorithm
Answer: c) Rivest-Shamir-Adleman - What is the main purpose of a public key in public-key cryptography? a) To encrypt data
b) To decrypt data
c) To generate a digital signature
d) To check the validity of an encryption key
Answer: a) To encrypt data - Which type of attack involves an attacker pretending to be a legitimate user and accessing a system using stolen credentials? a) Man-in-the-middle
b) Spoofing
c) Brute-force attack
d) Credential stuffing
Answer: d) Credential stuffing - Which of the following is used to provide authentication for users accessing online banking services? a) Passwords
b) Two-factor authentication (2FA)
c) PIN codes
d) Biometric verification
Answer: b) Two-factor authentication (2FA) - What is the key benefit of implementing a Virtual Private Network (VPN)? a) It prevents viruses from infecting the system
b) It hides the user’s IP address and encrypts their internet connection
c) It monitors user activity
d) It increases internet speed
Answer: b) It hides the user’s IP address and encrypts their internet connection - What is the primary purpose of a data backup system? a) To monitor internet traffic
b) To create copies of critical data to restore after a cyber attack or failure
c) To prevent malware from entering a system
d) To increase system performance
Answer: b) To create copies of critical data to restore after a cyber attack or failure - Which of the following is a method of preventing unauthorized access to an organization’s network? a) Use of strong passwords and multi-factor authentication
b) Regular backups
c) Encryption of all sensitive data
d) Use of antivirus software
Answer: a) Use of strong passwords and multi-factor authentication - Which of these best describes the role of a firewall? a) To store sensitive data securely
b) To block incoming and outgoing traffic based on predetermined security rules
c) To monitor employee activities
d) To provide encryption services for email communication
Answer: b) To block incoming and outgoing traffic based on predetermined security rules - Which of the following is an example of a physical security measure for protecting devices? a) Strong passwords
b) Locking devices in a secure location
c) Encryption
d) Software firewalls
Answer: b) Locking devices in a secure location - What is the first step in mitigating a ransomware attack? a) Paying the ransom
b) Disconnecting the infected systems from the network
c) Attempting to decrypt the files
d) Reinstalling the operating system
Answer: b) Disconnecting the infected systems from the network - Which of the following is NOT a type of attack in cyber security? a) Phishing
b) Ransomware
c) Patching
d) SQL Injection
Answer: c) Patching - What does the “principle of least privilege” mean in cyber security? a) Users should only have access to data and systems necessary for their job
b) Users should have access to all systems within the organization
c) Administrators should have the least access to sensitive data
d) All users should have full access to all systems
Answer: a) Users should only have access to data and systems necessary for their job - Which of these protocols is used to secure wireless networks? a) WEP
b) WPA
c) WPA2
d) All of the above
Answer: d) All of the above
81. What does a DDoS attack (Distributed Denial-of-Service) primarily aim to do?
a) Steal user credentials
b) Crash a website by overwhelming it with traffic
c) Encrypt files to demand ransom
d) Install malware on the target system
Answer: b) Crash a website by overwhelming it with traffic
82. Which of the following describes the function of a VPN (Virtual Private Network)?
a) Encrypts traffic between a client and server
b) Scans for malware on the system
c) Protects the network from unauthorized access
d) Detects suspicious activity on the network
Answer: a) Encrypts traffic between a client and server
83. Which of the following is an example of a passive attack?
a) Phishing
b) Sniffing
c) SQL Injection
d) Denial of Service
Answer: b) Sniffing
84. What does a “hash function” do in cryptography?
a) Encrypts data
b) Generates a unique fixed-size output for any input data
c) Decrypts data
d) Sends data over a secure channel
Answer: b) Generates a unique fixed-size output for any input data
85. Which of the following can be used to verify the integrity of files?
a) Encryption
b) Hashing
c) Compression
d) Authentication
Answer: b) Hashing
86. What does the term “data exfiltration” refer to?
a) Encrypting data for security
b) Stealing data from an organization’s systems
c) Making backups of critical data
d) Scrambling data for storage
Answer: b) Stealing data from an organization’s systems
87. What is the primary purpose of an Intrusion Prevention System (IPS)?
a) To monitor network traffic
b) To prevent unauthorized access by blocking potential threats
c) To generate security alerts
d) To store sensitive information
Answer: b) To prevent unauthorized access by blocking potential threats
88. Which of the following is the most effective way to mitigate social engineering attacks?
a) Use strong firewalls
b) Conduct employee training and awareness programs
c) Encrypt sensitive data
d) Install antivirus software
Answer: b) Conduct employee training and awareness programs
89. What is the main risk of using weak passwords in cyber security?
a) It increases the chance of a successful brute-force attack
b) It reduces the chances of a hacker gaining access
c) It allows data to be encrypted faster
d) It makes the system perform slower
Answer: a) It increases the chance of a successful brute-force attack
90. Which of the following protocols is used to secure email communication?
a) SMTP
b) IMAP
c) S/MIME
d) DNS
Answer: c) S/MIME
91. Which of the following is a malicious program that attaches itself to legitimate programs to execute when the program runs?
a) Virus
b) Trojan
c) Worm
d) Rootkit
Answer: a) Virus
92. What is the main function of a firewall in a network?
a) Encrypt data transmitted over the network
b) Block unauthorized access while permitting authorized communication
c) Store sensitive information securely
d) Detect viruses and malware
Answer: b) Block unauthorized access while permitting authorized communication
93. Which of these is the most common attack vector for delivering ransomware?
a) USB drives
b) Phishing emails
c) Direct network attacks
d) Brute-force attacks
Answer: b) Phishing emails
94. Which term refers to the process of making data unreadable to unauthorized users?
a) Compression
b) Encryption
c) Hashing
d) Encoding
Answer: b) Encryption
95. Which of these is a method of cyber attack where an attacker attempts to overload a server with traffic?
a) Phishing
b) SQL Injection
c) Denial of Service (DoS)
d) Man-in-the-Middle
Answer: c) Denial of Service (DoS)
96. Which of the following is NOT an example of a physical security measure?
a) Biometric access control
b) Locking doors and windows
c) Encryption of hard drives
d) Security cameras
Answer: c) Encryption of hard drives
97. What does “black hat” refer to in the context of hacking?
a) A hacker with malicious intent
b) A hacker who tests systems for vulnerabilities
c) A type of network protocol
d) A security measure for encrypting data
Answer: a) A hacker with malicious intent
98. Which of the following best describes an “insider threat”?
a) A hacker who attacks from outside the organization
b) A security breach caused by someone with authorized access to the system
c) An attack initiated by an anonymous third party
d) A form of malware that affects the system from within
Answer: b) A security breach caused by someone with authorized access to the system
99. What is the most effective way to secure data stored on a mobile device?
a) Use strong passwords and enable encryption
b) Install antivirus software
c) Use public Wi-Fi networks
d) Disable all security settings
Answer: a) Use strong passwords and enable encryption
100. Which of the following is an example of a “Zero Trust” security model?
a) Only trusting users within the organization
b) Never trusting any user or device, regardless of location
c) Allowing unrestricted access to users based on passwords
d) Providing access based on IP addresses only
Answer: b) Never trusting any user or device, regardless of location
101. What is the main objective of the “confidentiality” component in the CIA triad?
a) To ensure data integrity
b) To prevent unauthorized access to sensitive information
c) To make data available when needed
d) To ensure data is accurately represented
Answer: b) To prevent unauthorized access to sensitive information
102. Which of the following is used to authenticate a user in multi-factor authentication (MFA)?
a) A password only
b) A password and a physical token or biometric data
c) Only biometric data
d) A one-time PIN sent via email
Answer: b) A password and a physical token or biometric data
103. Which type of malware uses a fake website to collect sensitive information from users?
a) Trojan horse
b) Keylogger
c) Phishing
d) Spyware
Answer: c) Phishing
104. Which of the following is a secure way of protecting data on a hard drive?
a) Regular backups
b) Disk encryption
c) Data compression
d) Using a stronger password
Answer: b) Disk encryption
105. Which of these is a feature of an effective password policy?
a) Use short passwords for convenience
b) Require periodic password changes
c) Allow users to use the same password across multiple sites
d) Do not allow special characters in passwords
Answer: b) Require periodic password changes
106. What is the purpose of two-factor authentication (2FA)?
a) To improve password strength
b) To require two separate passwords for each login
c) To provide an additional layer of security by requiring a second form of verification
d) To encrypt login credentials
Answer: c) To provide an additional layer of security by requiring a second form of verification
107. Which of these is a commonly used technique to prevent SQL injection attacks?
a) Enabling HTTPS
b) Input validation and parameterized queries
c) Disabling JavaScript
d) Using VPNs for all users
Answer: b) Input validation and parameterized queries
108. Which of the following is a risk of using public Wi-Fi networks?
a) Increased encryption strength
b) Increased exposure to man-in-the-middle attacks
c) Improved network speed
d) Reduced risk of malware infections
Answer: b) Increased exposure to man-in-the-middle attacks
109. Which of the following is a key benefit of using biometric authentication?
a) It is faster than traditional passwords
b) It ensures user convenience and can be bypassed easily
c) It eliminates the need for passwords entirely
d) It is easy to hack compared to passwords
Answer: a) It is faster than traditional passwords
110. What is “spear phishing”?
a) A form of phishing targeted at a specific individual or organization
b) A type of virus
c) A method of bypassing network security
d) A form of social engineering involving physical attacks
Answer: a) A form of phishing targeted at a specific individual or organization
111. Which of the following actions can help prevent data breaches in an organization?
a) Using strong encryption
b) Limiting employee access to sensitive data
c) Regularly updating and patching software
d) All of the above
Answer: d) All of the above
112. What is “shoulder surfing”?
a) Eavesdropping on network communications
b) Looking over someone’s shoulder to steal information
c) A method of bypassing network firewalls
d) A type of social engineering attack
Answer: b) Looking over someone’s shoulder to steal information
113. Which of the following is the best way to store a password securely?
a) Write it down on paper and keep it in a safe place
b) Store it in an encrypted password manager
c) Save it in an unencrypted text file
d) Use the same password for multiple accounts
Answer: b) Store it in an encrypted password manager
114. Which of the following is the most secure form of authentication?
a) Password
b) PIN
c) Two-factor authentication (2FA)
d) Biometric authentication
Answer: d) Biometric authentication
115. Which type of malware is designed to replicate and spread across networks, often causing system slowdowns?
a) Worm
b) Trojan
c) Rootkit
d) Virus
Answer: a) Worm
116. Which of these can be considered an attack that targets the “trust” relationship between two systems or users?
a) Spoofing
b) Phishing
c) Man-in-the-middle
d) All of the above
Answer: d) All of the above
117. Which of the following is NOT a characteristic of a strong password?
a) Includes both upper and lower case letters
b) Is at least 12 characters long
c) Is composed of only dictionary words
d) Contains special characters or numbers
Answer: c) Is composed of only dictionary words
118. Which of these attacks involves an attacker capturing and altering communications between two parties?
a) Sniffing
b) Phishing
c) Man-in-the-middle
d) DDoS
Answer: c) Man-in-the-middle
119. What is the purpose of a digital certificate?
a) To encrypt communications
b) To verify the identity of the certificate holder
c) To store public encryption keys
d) To generate a random encryption key
Answer: b) To verify the identity of the certificate holder
120. What does the term “patch management” refer to?
a) Storing software patches for future use
b) A process of testing patches before they are applied
c) The process of applying updates to software to fix vulnerabilities
d) Monitoring the effectiveness of patches
Answer: c) The process of applying updates to software to fix vulnerabilities
121. Which of the following describes a “backdoor” in a system?
a) A method used by attackers to gain unauthorized access while bypassing security mechanisms
b) A tool used for legitimate access to network systems
c) A type of antivirus software
d) A security feature for encrypting communications
Answer: a) A method used by attackers to gain unauthorized access while bypassing security mechanisms
122. Which of these is a characteristic of a phishing email?
a) It typically asks for personal information or login credentials
b) It contains no errors or mistakes in grammar
c) It is sent from a trusted, verified sender
d) It includes a personal message or invitation
Answer: a) It typically asks for personal information or login credentials
123. What is a honeypot in cybersecurity?
a) A physical trap designed to catch intruders
b) A fake system set up to attract and detect attackers
c) A system used to block malware
d) A method of protecting sensitive data
Answer: b) A fake system set up to attract and detect attackers
124. Which of the following is a key feature of a secure socket layer (SSL) connection?
a) It encrypts data to ensure secure communication between two parties
b) It speeds up internet connection speeds
c) It detects malware on websites
d) It stores sensitive user data in the cloud
Answer: a) It encrypts data to ensure secure communication between two parties
125. What is a key advantage of using multi-factor authentication (MFA)?
a) It increases the complexity of passwords
b) It reduces the risk of unauthorized access by requiring more than one form of verification
c) It eliminates the need for strong passwords
d) It improves system performance
Answer: b) It reduces the risk of unauthorized access by requiring more than one form of verification
126. Which of the following is an example of a cyber attack targeting a website by overwhelming it with traffic from multiple sources?
a) Phishing
b) Denial-of-Service (DoS)
c) SQL Injection
d) Cross-site Scripting (XSS)
Answer: b) Denial-of-Service (DoS)
127. What is “crypto-malware”?
a) Malware that steals cryptocurrency
b) Malware that locks and encrypts files, demanding a ransom for decryption
c) Malware that targets encryption keys
d) Malware that causes the system to run slow due to mining cryptocurrency
Answer: b) Malware that locks and encrypts files, demanding a ransom for decryption
128. What is the main function of an antivirus program?
a) To provide secure web browsing
b) To detect and remove malware from the system
c) To encrypt sensitive files
d) To monitor network traffic
Answer: b) To detect and remove malware from the system
129. What does “end-to-end encryption” ensure in communication?
a) The data is sent securely between two devices without interception
b) The data is compressed for faster transmission
c) The data is encrypted for storage in the cloud
d) The data is backed up regularly to prevent loss
Answer: a) The data is sent securely between two devices without interception
130. Which of the following is a characteristic of “whaling” attacks?
a) It targets high-level executives and important individuals within organizations
b) It targets large groups of people indiscriminately
c) It targets only small businesses
d) It involves attacking government websites
Answer: a) It targets high-level executives and important individuals within organizations
131. What is a “trojan horse” in cybersecurity?
a) A self-replicating program that spreads across networks
b) A malicious program that hides inside legitimate software
c) A type of virus that damages files
d) A software tool used to manage firewalls
Answer: b) A malicious program that hides inside legitimate software
132. Which of the following is the primary purpose of an Intrusion Detection System (IDS)?
a) To detect and block malicious activity in real-time
b) To prevent unauthorized access to the network
c) To detect suspicious network activity and alert administrators
d) To monitor network traffic for vulnerabilities
Answer: c) To detect suspicious network activity and alert administrators
133. Which of the following is a vulnerability scanner used in network security?
a) Wireshark
b) Metasploit
c) Nmap
d) Nessus
Answer: d) Nessus
134. What does “two-factor authentication” require in addition to a password?
a) A PIN code
b) A physical token or biometric scan
c) An email verification
d) A backup password
Answer: b) A physical token or biometric scan
135. Which of the following best describes “malvertising”?
a) Using fake ads to infect users with malware
b) A method to block malicious content on websites
c) Advertising the dangers of malware
d) Using encrypted ads to protect users from attacks
Answer: a) Using fake ads to infect users with malware
136. What does the term “data breach” refer to?
a) The loss of data stored on physical media
b) Unauthorized access or exposure of sensitive information
c) Data that is accidentally deleted from the system
d) Data being encrypted by ransomware
Answer: b) Unauthorized access or exposure of sensitive information
137. Which of these is the main purpose of an anti-malware program?
a) To encrypt files
b) To prevent unauthorized users from accessing a system
c) To detect and remove malicious software
d) To monitor network traffic
Answer: c) To detect and remove malicious software
138. What is the first step in responding to a cybersecurity incident?
a) Notify law enforcement
b) Contain the incident to prevent further damage
c) Reinstall all affected systems
d) Publish an incident report
Answer: b) Contain the incident to prevent further damage
139. Which of these attacks is primarily designed to capture login credentials from a user?
a) Phishing
b) SQL Injection
c) Denial-of-Service
d) Man-in-the-middle
Answer: a) Phishing
140. What is a major risk of using public Wi-Fi networks?
a) The network may be faster
b) The data transmitted could be intercepted by attackers
c) The network is always encrypted
d) The network always uses strong authentication
Answer: b) The data transmitted could be intercepted by attackers
141. What is the primary function of an SSL/TLS certificate?
a) To provide email encryption
b) To encrypt data exchanged between a web server and a client
c) To verify a user’s identity
d) To monitor web traffic for threats
Answer: b) To encrypt data exchanged between a web server and a client
142. **Which of the following is an
example of a zero-day vulnerability?**
a) A bug that has already been patched
b) A known vulnerability that is not yet fixed
c) A vulnerability that is part of a software upgrade
d) A virus that exploits outdated software
Answer: b) A known vulnerability that is not yet fixed
143. What does “social engineering” typically involve?
a) Manipulating individuals into breaking security protocols or revealing confidential information
b) Conducting denial-of-service attacks
c) Installing and spreading malware
d) Encrypting data to make it unreadable
Answer: a) Manipulating individuals into breaking security protocols or revealing confidential information
144. What does the term “cyber hygiene” refer to?
a) Regular maintenance and good practices to keep a system secure
b) Cleaning physical hardware to ensure longevity
c) Regularly scanning the internet for vulnerabilities
d) Using a firewall to protect data
Answer: a) Regular maintenance and good practices to keep a system secure
145. What is a “botnet”?
a) A malicious network of infected computers used to carry out cyber attacks
b) A type of firewall used for filtering malicious traffic
c) A software used for encrypted communications
d) A tool used for scanning networks for vulnerabilities
Answer: a) A malicious network of infected computers used to carry out cyber attacks
146. Which type of attack can be mitigated by using HTTPS?
a) SQL Injection
b) Phishing
c) Man-in-the-middle
d) Denial-of-service
Answer: c) Man-in-the-middle
147. What is the main purpose of using encryption in cybersecurity?
a) To improve system performance
b) To prevent unauthorized access to sensitive data
c) To make data more accessible
d) To speed up network connections
Answer: b) To prevent unauthorized access to sensitive data
148. Which of these is a form of network security?
a) Encryption
b) Firewalls
c) VPNs
d) All of the above
Answer: d) All of the above
149. Which of the following is an example of “spyware”?
a) Software that monitors and collects user data without consent
b) Software that protects against cyber threats
c) A virus that damages system files
d) Software that enhances system performance
Answer: a) Software that monitors and collects user data without consent
150. What is the primary purpose of a security audit?
a) To fix vulnerabilities
b) To evaluate the effectiveness of security controls and policies
c) To identify potential new threats
d) To increase network speed
Answer: b) To evaluate the effectiveness of security controls and policies
151. Which of the following is a key feature of a Virtual Private Network (VPN)?
a) It prevents malware from entering the network
b) It allows users to browse anonymously by encrypting their internet traffic
c) It improves system performance
d) It speeds up internet connection speeds
Answer: b) It allows users to browse anonymously by encrypting their internet traffic
152. Which of these is a common method used by attackers in social engineering?
a) SQL Injection
b) Phishing
c) Cryptojacking
d) Cross-site Scripting (XSS)
Answer: b) Phishing
153. Which of the following is NOT an example of a “security control”?
a) Antivirus software
b) Encryption
c) Backup and recovery systems
d) Web browser cookies
Answer: d) Web browser cookies
154. What does a Distributed Denial-of-Service (DDoS) attack do?
a) Steals sensitive data from a system
b) Overwhelms a target system with traffic, causing it to crash
c) Injects malicious code into a website
d) Gains unauthorized access to private data
Answer: b) Overwhelms a target system with traffic, causing it to crash
155. Which of these is a key step in preventing man-in-the-middle attacks?
a) Implementing multi-factor authentication
b) Using end-to-end encryption for communication
c) Disabling firewalls
d) Disabling antivirus software
Answer: b) Using end-to-end encryption for communication
156. Which of the following attacks involves inserting malicious code into an application’s database?
a) Phishing
b) SQL Injection
c) Cross-site Scripting (XSS)
d) Spoofing
Answer: b) SQL Injection
157. What is a “zero-day” attack?
a) An attack that exploits a vulnerability on the day the vulnerability is discovered
b) An attack that targets a specific user
c) A type of attack that occurs every day at the same time
d) An attack that uses zero data
Answer: a) An attack that exploits a vulnerability on the day the vulnerability is discovered
158. Which type of security technology is typically used to prevent unauthorized network access?
a) Firewalls
b) VPNs
c) IDS/IPS
d) All of the above
Answer: d) All of the above
159. Which type of attack involves manipulating an online search engine ranking to increase a malicious site’s visibility?
a) Clickjacking
b) SEO poisoning
c) Man-in-the-middle
d) Spoofing
Answer: b) SEO poisoning
160. Which of the following is the most secure method for storing passwords?
a) Storing passwords in plain text
b) Storing passwords in a database with encryption
c) Storing passwords in an unsecured file
d) Storing passwords in a paper notebook
Answer: b) Storing passwords in a database with encryption
161. What is the purpose of a “sandbox” in cybersecurity?
a) To store malicious files securely
b) To create a secure testing environment to run potentially dangerous programs
c) To hide data from attackers
d) To track network activity
Answer: b) To create a secure testing environment to run potentially dangerous programs
162. Which of the following best defines the concept of “least privilege”?
a) Giving users only the minimum access required to perform their jobs
b) Allowing users to perform any administrative task
c) Granting all permissions to all users
d) Using a strong password for every account
Answer: a) Giving users only the minimum access required to perform their jobs
163. Which attack uses fake websites to trick users into entering their personal information?
a) Spoofing
b) Phishing
c) Man-in-the-middle
d) Denial-of-service
Answer: b) Phishing
164. Which of these is a characteristic of ransomware?
a) It encrypts files and demands payment to decrypt them
b) It logs user keystrokes
c) It spreads by exploiting unpatched vulnerabilities
d) It is used to block access to a website
Answer: a) It encrypts files and demands payment to decrypt them
165. What is the purpose of a “firewall” in network security?
a) To block malware from entering a network
b) To provide encryption for data in transit
c) To monitor network traffic for suspicious activity
d) To prevent unauthorized access to or from a private network
Answer: d) To prevent unauthorized access to or from a private network
166. Which of these is considered a form of “endpoint security”?
a) Using firewalls to protect the network
b) Encrypting data stored on a hard drive
c) Installing antivirus software on client devices
d) Using a VPN
Answer: c) Installing antivirus software on client devices
167. What is the primary objective of the GDPR (General Data Protection Regulation)?
a) To promote the use of cloud computing
b) To protect personal data and privacy of individuals within the EU
c) To allow companies to share personal data freely
d) To regulate data traffic over the internet
Answer: b) To protect personal data and privacy of individuals within the EU
168. Which of these is a form of network traffic analysis used to detect malicious activity?
a) Penetration testing
b) Intrusion Detection Systems (IDS)
c) Phishing simulations
d) All of the above
Answer: b) Intrusion Detection Systems (IDS)
169. What does the term “social engineering” describe in cybersecurity?
a) Using technical skills to break into a network
b) Exploiting human psychology to manipulate individuals into revealing confidential information
c) Creating artificial intelligence to defend against attacks
d) Encrypting sensitive information
Answer: b) Exploiting human psychology to manipulate individuals into revealing confidential information
170. Which of the following is an example of a brute-force attack?
a) Trying many different passwords in quick succession to crack an account
b) Using a keylogger to capture a user’s password
c) Exploiting a vulnerability in software
d) Redirecting a user to a fake website
Answer: a) Trying many different passwords in quick succession to crack an account
171. Which of these is the best method to secure a wireless network?
a) Use a weak password for the router
b) Use WPA3 encryption for Wi-Fi security
c) Allow unrestricted access to the network
d) Disable the router’s firewall
Answer: b) Use WPA3 encryption for Wi-Fi security
172. What is the role of a Public Key Infrastructure (PKI)?
a) To encrypt communications between devices
b) To authenticate and manage digital certificates for secure communication
c) To block malware from entering a network
d) To create backup copies of encrypted data
Answer: b) To authenticate and manage digital certificates for secure communication
173. Which of these is a key element of a good disaster recovery plan?
a) Periodically testing backup systems
b) Disabling antivirus software during a disaster
c) Ignoring updates to systems during recovery
d) Restricting access to recovery tools
Answer: a) Periodically testing backup systems
174. What is the main purpose of a Security Information and Event Management (SIEM) system?
a) To protect a system from external threats
b) To provide centralized logging and analysis of security-related data
c) To encrypt data at rest
d) To prevent access to a network
Answer: b) To provide centralized logging and analysis of security-related data
175. Which of the following is an example of a non-technical security control?
a) Using a firewall
b) Encrypting data
c) Employee security training
d) Installing antivirus software
Answer: c) Employee security training
176. What does “pharming” refer to in cybersecurity?
a) Creating fake websites to trick users into revealing personal information
b) Redirecting a website’s traffic to a fraudulent site without the user’s knowledge
c) Monitoring user behavior to gain unauthorized access
d) Sending unsolicited emails to users to gather information
Answer: b) Redirecting a website’s traffic to a fraudulent site without the user’s knowledge
177. What is the best method to protect sensitive information when using a public computer?
a) Use the “Remember Me” feature on websites
b) Clear your browsing history and log out of all accounts after use
c) Avoid using encryption software
d) Share your account details with trusted individuals
Answer: b) Clear your browsing history and log out of all accounts after use
178. Which of these is a primary concern when implementing a cloud security strategy?
a) Managing encryption keys for sensitive data
b) Using strong passwords for cloud accounts
c) Regularly updating software and hardware
d) All of the above
Answer: d) All of the above
179. Which of the following is a common method used by attackers to extract sensitive information from websites?
a) SQL Injection
b) Cross-site Scripting (XSS)
c) Man-in-the-middle attack
d) All of the above
Answer: d) All of the above
180. What is “data loss prevention” (DLP)?
a) A technique used to back up data
b) A strategy to prevent unauthorized access to sensitive data
c) A method of restoring deleted files
d) A program used to recover lost data
Answer: b) A strategy to prevent unauthorized access to sensitive data
181. Which of the following is an example of a denial-of-service attack?
a) Flooding a server with traffic to make it unresponsive
b) Encrypting files and demanding a ransom
c) Installing spyware on a victim’s computer
d) Monitoring network traffic for suspicious activity
Answer: a) Flooding a server with traffic to make it unresponsive
182. What is the role of an Intrusion Prevention System (IPS)?
a) To monitor network traffic for suspicious activity and block it in real-time
b) To alert users about possible threats
c) To store encryption keys securely
d) To manage firewalls and network configurations
Answer: a) To monitor network traffic for suspicious activity and block it in real-time
183. What does “BYOD” stand for?
a) Bring Your Own Device
b) Bring Your Own Data
c) Backup Your Online Data
d) Block Your Online Data
Answer: a) Bring Your Own Device
184. Which of the following is a reason why encrypted communications are essential for cybersecurity?
a) To increase the speed of network traffic
b) To ensure data integrity during transmission
c) To prevent unauthorized access to sensitive data
d) To store data in the cloud
Answer: c) To prevent unauthorized access to sensitive data
185. Which of the following is NOT a feature of a digital signature?
a) Ensures data integrity
b) Provides non-repudiation
c) Encrypts the data
d) Verifies the identity of the sender
Answer: c) Encrypts the data
186. Which type of attack involves an attacker inserting malicious scripts into a webpage to steal user information?
a) Cross-site Scripting (XSS)
b) Man-in-the-middle
c) Denial-of-service
d) SQL Injection
Answer: a) Cross-site Scripting (XSS)
187. What does the term “black hat” hacker refer to?
a) A hacker who works for ethical purposes
b) A hacker who exploits vulnerabilities for malicious intent
c) A hacker who develops security software
d) A hacker who only conducts research
Answer: b) A hacker who exploits vulnerabilities for malicious intent
188. Which of the following is an example of a “strong” password?
a) password123
b) P@ssw0rd!#5
c) qwerty
d) 123456
Answer: b) P@ssw0rd!#5
189. What does the term “white hat” hacker mean?
a) A hacker who works for malicious purposes
b) A hacker who uses hacking skills for ethical and legal purposes
c) A hacker who creates viruses for testing
d) A hacker who doesn’t use any tools
Answer: b) A hacker who uses hacking skills for ethical and legal purposes
190. Which of the following methods is used to protect against cross-site scripting (XSS) attacks?
a) Using encryption on the website
b) Using input validation and output encoding
c) Using a firewall
d) Using a VPN
Answer: b) Using input validation and output encoding
191. Which of these is a common cybersecurity risk associated with mobile devices?
a) Data leakage through insecure apps
b) Lack of proper encryption
c) Unsecured Wi-Fi connections
d) All of the above
Answer: d) All of the above
192. What is the purpose of “network segmentation”?
a) To reduce traffic on the network
b) To protect sensitive data by separating parts of the network
c) To increase network speed
d) To make network configurations simpler
Answer: b) To protect sensitive data by separating parts of the network
193. Which of these is a method for protecting sensitive data in transit?
a) Using SSL/TLS encryption
b) Encrypting files at rest
c) Using strong passwords for accounts
d) Regularly updating software
Answer: a) Using SSL/TLS encryption
194. What is a “rootkit”?
a) A tool used to test a network for vulnerabilities
b) A set of malicious tools used to hide a malware infection
c) A program used to encrypt communications
d) A tool used to monitor network traffic
Answer: b) A set of malicious tools used to hide a malware infection
195. Which of the following is the primary goal of encryption?
a) To speed up the transmission of data
b) To secure sensitive data during transmission and storage
c) To increase network performance
d) To track user behavior
Answer: b) To secure sensitive data during transmission and storage
196. What does “multi-factor authentication” require?
a) Two or more forms of verification to access an account
b) A password and security questions
c) A username and password only
d) A password and credit card number
Answer: a) Two or more forms of verification to access an account
197. Which of these is NOT a characteristic of a phishing attack?
a) It uses fake websites to steal login credentials
b) It sends unsolicited emails
c) It involves capturing network traffic
d) It often uses social engineering tactics
Answer: c) It involves capturing network traffic
198. What does the acronym “IDS” stand for in cybersecurity?
a) Internet Detection System
b) Intrusion Detection System
c) Internal Data Security
d) Integrated Defense System
Answer: b) Intrusion Detection System
199. What does the term “patch management” refer to in cybersecurity?
a) The process of applying security patches to software
b) The process of removing outdated software
c) The creation of new software
d) The monitoring of security systems for vulnerabilities
Answer: a) The process of applying security patches to software
200. Which of the following is a primary responsibility of a cybersecurity professional?
a) To monitor network activity and prevent unauthorized access
b) To back up data regularly
c) To maintain physical security of devices
d) To test user passwords regularly
Answer: a) To monitor network activity and prevent unauthorized access